期刊文献+

网络安全评估方法的研究与实践 被引量:9

Research and Practice on Network Security Evaluation Method
在线阅读 下载PDF
导出
摘要 网络安全评估技术和方法的研究对网络安全防护体系的建设具有重要意义。该文结合实际工作经验和研究成果,在分析安全评估技术发展现状的基础上,提出了一种定性分析与定量计算相结合的风险评估模型,给出了具体算法及基于该算法的风险评估流程,并加以实际应用。实践结果证明,应用该算法和模型实施的风险评估对被评估单位的网络安全防护和管理工作起到了良好的指导作用。 Network security evaluation technologies and methods are important to the network security protection system. Combined with the actual experience and research results and based on the analysis of the present status about security evaluation technologies, this paper puts forward and describes an efficient model and algorithm with qualitative analysis and the quantify calculate, and gives a risk evaluation flow based on the algorithm. The model is applied in security evaluation work and the practice result proves that the model and algorithm do a good directive function in network security protection and management.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第16期133-135,138,共4页 Computer Engineering
基金 国家"973"计划基金资助项目(G1999035806) 北京电子科技学院开放研究基金资助项目
关键词 信息安全 评估 模型 算法 information security evaluation model algorithm
  • 相关文献

参考文献6

  • 1CERT/CC.CERT/CC Statistics for 1988 through 2005[Z].[2006-06] http:// www.cert.org/stats/cert_stats.html.
  • 2ISO/IEC 17799-2005 Information Technology-security Techniquescode of Practice for Information Security Management[S].2005-06.
  • 3Alberts C J,Behrens S G,Pethia R D,et al.Operationally Critical Threat,Asset and Vulnerability EvaluationSM[EB/OL].(2004-10-20).http://www.cert.org/octave/.
  • 4ISO/IEC 13335-1996 Information Technology:Guidelines for the Management of IT Security[S].1996-2001.
  • 5Haimes Y Y.Risk modeling,Assessment,and Management[M].2nd ed.USA:Wiley,2004.
  • 6王英梅,刘增良.基于PRA的网络安全风险评估模型[J].计算机工程,2006,32(1):40-42. 被引量:7

二级参考文献6

  • 1AndressM.计算机安全原理[M].北京:机械工业出版社,2002-06..
  • 2Peltier T R. Information Security Risk Analysis[M]. Auerbach Publishtions, 2001.
  • 3Bedford T, Cooke R. Probabilistic Risk Analysis[M]. Cambridge University Press, 2001.
  • 4Fault Tree Diagrams and System Analysis[Z]. http://www.chinarel.com/systemrelweb/, 2003-12.
  • 5National Institute of Standards and Technology(NIST). ICAT Metabase[Z]. http://icat.nist.gov/, 2002.
  • 6SecurityFocus. SecurityFocus Online Vulnerability Database[Z]. http://online.securityfocus.com, 2002.

共引文献6

同被引文献43

引证文献9

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部